CyberSecurity LongQuiz (Prelim)

CyberSecurity LongQuiz (Prelim)

University

30 Qs

quiz-placeholder

Similar activities

MOD9 Topic Test - Cyber Security and Law - CAM Nationals in IT

MOD9 Topic Test - Cyber Security and Law - CAM Nationals in IT

7th Grade - University

32 Qs

Hacking Technique Quiz 2

Hacking Technique Quiz 2

University

34 Qs

ITSY201-Fundamentals of computer security-Practice Chapter 1 2 3

ITSY201-Fundamentals of computer security-Practice Chapter 1 2 3

University

30 Qs

External threats

External threats

KG - Professional Development

26 Qs

Information assurance and security

Information assurance and security

University

25 Qs

Cys quiz 1

Cys quiz 1

University

25 Qs

E-Security

E-Security

11th Grade - University

31 Qs

Hacking quiz

Hacking quiz

University

26 Qs

CyberSecurity LongQuiz (Prelim)

CyberSecurity LongQuiz (Prelim)

Assessment

Quiz

Computers

University

Medium

Created by

Nikki Joi Policar

Used 4+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

This consists of the cyber-physical systems that modern societies rely on.

Application Security

Critical Infrastructure Security

Cloud Security

Network Security

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a practice of protecting systems, networks, and programs from digital attacks.

Cyberguard

Security

Cybersecurity

CyberArchitect

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

S/He works as an advisor and supervisor for all security measures necessary to protect a company or client’s assets effectively.

Security Consultant

Security Architect

CISO

All of the above

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Hackers usually start by researching and gathering information about the target organization. They look for network ranges, IP addresses, and domain names.

Attack

Expamsion

Obfuscation

Reconnaissance

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After getting access to the network, hackers proceed with infiltrating the organization’s network. But to access the network freely, they need access privileges

Reconnaissance

Attack

Expansion

Obfuscation

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

It is a type of malicious software designed to extort money by blocking access to files or the computer system until the ransom is paid.

Ransomware

Malware

Social engineering

Phishing

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

 This layer of cybersecurity ensures that IT teams have strategies in place to proactively prevent and to respond quickly and effectively in the event of a cybersecurity incident.

Employee

Processes

Technology

None of the these

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?